Secure your Shaw router

1 Change your Shaw router default password https://support.shaw.ca/t5/internet-articles/how-to-log-in-to-your-shaw-wifi-modem/ta-p/6468 ” If you have an Ignite WiFi Gateway (formerly known as Fibre+ Gateway): Open an Internet browser (e.g. Google Chrome) and locate the address bar. In the address bar, type in the following: 10.0.0.1 and press the enter key on your keyboard. You will be presented with your WiFi modem login page. […]

Secure your Shaw router Read More »

MSI confirms data breach and ransomware attack

MSI Statement April 07, 2023 MSI recently suffered a cyberattack on part of its information systems. Upon detecting network anomalies, the information department promptly activated relevant defense mechanisms and carried out recovery measures, and reported the incident to government law enforcement agencies and cybersecurity units. Currently, the affected systems have gradually resumed normal operations, with

MSI confirms data breach and ransomware attack Read More »

Common VPN security risks

All network data bypass Most of IPsec and OpenVPN create IP tunnels on VPN clients, e.g. Windows PC, Android, IOS. After VPN sessions are created, which means the routing tables on operating system will be modified after a VPN session activated. On Fig 2, all network traffic will go through VPN interface ‘eth3’, which routing

Common VPN security risks Read More »

Fundamental computer security practices

Rule #0: Using multiple offline backup media and reliable cloud service. Offline backup media is still the most reliable data backup plan. Using cloud service to protect Ransomware. Rule #1: Keeping your computer update-to-date. If you are still using Windows7, Please upgrade to Windows10 since Microsoft will no longer support Windows7 (https://www.microsoft.com/en-us/windows/windows-7-end-of-life-support-information). If you are

Fundamental computer security practices Read More »

Mandatory access control for GNU Linux

Mandatory access control for GNU/Linux Why MAC With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects

Mandatory access control for GNU Linux Read More »